Dr Tine Munk - Academia.edu (original) (raw)
Papers by Dr Tine Munk
Revista Comunicação e Sociedade, Dec 16, 2022
Comunicação e Sociedade
The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to moder... more The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to modern military strategies. Although the Russian army has developed cyber capabilities and capacities over the years, Ukraine has quickly created a new and innovative cyber defence that includes public and private actors. Using online communication platforms to reach out to populations, internally and externally, has been instrumental for military success. Inventive thinking has enabled the actors to utilise the online space and develop new computing tactics to defend the country. The intense online presence of Ukrainian President Zelenskyy stands in clear contrast to Russian President Putin. President Zelenskyy is mastering online communication and is speaking directly to the people. Because of his constant use of virtual communication platforms, new public and private resistance movements have formed based on civic activism and a defiant stance against Russian aggression. Various non-govern...
In recent decades there has been an increased drive towards partnership working, and the developm... more In recent decades there has been an increased drive towards partnership working, and the development of interagency relations between the police and a variety of other public, private, voluntary and non-profit agencies and organisations. Partnerships have come to be viewed as a key vehicle through which crime and disorder can be effectively tackled, at both the local and national levels, and has become a dominant theme in the rhetoric of public sector reform. Significant cuts to police budgets, as well as the broader context of the economic down-turn and growing social inequality all provide a renewed impetus to revisit these policing partnerships to explore the role of the police therein and the potential for these policing partnerships to impact on social problems in contemporary times. In this rapid evidence review we focus on four key areas of policing partnerships: (1) collaboration between police forces; (2) multi-agency partnerships involving the police; (3) partnerships betw...
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
A report of pump priming research on disproportionality on grounds of ethnicity in employment and... more A report of pump priming research on disproportionality on grounds of ethnicity in employment and regulatory practices in the police, legal, medical and pharmacy professions.
Cyber terrorism is an emerging problem. Defining and categorise a diverse set of politically-moti... more Cyber terrorism is an emerging problem. Defining and categorise a diverse set of politically-motivated online crimes is a complicated task. When is a group classified as a terrorist and when is the online activity defined as terrorism? This article discusses some of the challenges defining cyber-terrorism and politically-motivated cybercrime.
EU Internet Law in the Digital Single Market, 2021
In the current online environment, social media platforms, Internet businesses and tech companies... more In the current online environment, social media platforms, Internet businesses and tech companies are managing a high level of personal data with little regard to their customers’ privacy and data protection. The chapter will focus on the impact that the European General Data Protection Regulation (GDPR) 2018 has on data protection and privacy rights of online users in the light of the increasing data collection and processing practices by voice recognition technologies (voice assistants). The chapter will focus on the use of GDPR’s Article 66 to stop data collection/processing practices that potentially violate the provisions in the regulation. The case study outlined in this chapter investigates how data are managed by the Internet and tech companies, such as Apple, Google, Amazon and Facebook and how these companies’ data collection/processing practices circumvent online users' privacy rights. The case study will predominately focus on Google’s practice of manually assessing ...
The chapter concerns public and private policing of online platforms and the current challenges i... more The chapter concerns public and private policing of online platforms and the current challenges in terms of legislation, policing practices and the Dark Web.
This thesis explores the nature of cyber-security at the beginning of the 21st century. In the cu... more This thesis explores the nature of cyber-security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber-security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber-space is visible in all public-private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber-attacks on public and private entities are increasing. This requires a security framework that is flexible and establishes different types of security cooperation to manage the widespread cyber-risks. This is essential to the development of security strategies, governance forms, practices, and guidelines for enhancing resilience and preparedness towards cyber-risks. Therefore, I am examining cyber-security through the lenses of n...
Discussion about a coordinated approach to removing online extremism that looks beyond big intern... more Discussion about a coordinated approach to removing online extremism that looks beyond big internet companies.
Revista Comunicação e Sociedade, Dec 16, 2022
Comunicação e Sociedade
The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to moder... more The Russian invasion of Ukraine in February 2022 has shown that cyberwarfare is integral to modern military strategies. Although the Russian army has developed cyber capabilities and capacities over the years, Ukraine has quickly created a new and innovative cyber defence that includes public and private actors. Using online communication platforms to reach out to populations, internally and externally, has been instrumental for military success. Inventive thinking has enabled the actors to utilise the online space and develop new computing tactics to defend the country. The intense online presence of Ukrainian President Zelenskyy stands in clear contrast to Russian President Putin. President Zelenskyy is mastering online communication and is speaking directly to the people. Because of his constant use of virtual communication platforms, new public and private resistance movements have formed based on civic activism and a defiant stance against Russian aggression. Various non-govern...
In recent decades there has been an increased drive towards partnership working, and the developm... more In recent decades there has been an increased drive towards partnership working, and the development of interagency relations between the police and a variety of other public, private, voluntary and non-profit agencies and organisations. Partnerships have come to be viewed as a key vehicle through which crime and disorder can be effectively tackled, at both the local and national levels, and has become a dominant theme in the rhetoric of public sector reform. Significant cuts to police budgets, as well as the broader context of the economic down-turn and growing social inequality all provide a renewed impetus to revisit these policing partnerships to explore the role of the police therein and the potential for these policing partnerships to impact on social problems in contemporary times. In this rapid evidence review we focus on four key areas of policing partnerships: (1) collaboration between police forces; (2) multi-agency partnerships involving the police; (3) partnerships betw...
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
The Rise of Politically Motivated Cyber Attacks, 2022
A report of pump priming research on disproportionality on grounds of ethnicity in employment and... more A report of pump priming research on disproportionality on grounds of ethnicity in employment and regulatory practices in the police, legal, medical and pharmacy professions.
Cyber terrorism is an emerging problem. Defining and categorise a diverse set of politically-moti... more Cyber terrorism is an emerging problem. Defining and categorise a diverse set of politically-motivated online crimes is a complicated task. When is a group classified as a terrorist and when is the online activity defined as terrorism? This article discusses some of the challenges defining cyber-terrorism and politically-motivated cybercrime.
EU Internet Law in the Digital Single Market, 2021
In the current online environment, social media platforms, Internet businesses and tech companies... more In the current online environment, social media platforms, Internet businesses and tech companies are managing a high level of personal data with little regard to their customers’ privacy and data protection. The chapter will focus on the impact that the European General Data Protection Regulation (GDPR) 2018 has on data protection and privacy rights of online users in the light of the increasing data collection and processing practices by voice recognition technologies (voice assistants). The chapter will focus on the use of GDPR’s Article 66 to stop data collection/processing practices that potentially violate the provisions in the regulation. The case study outlined in this chapter investigates how data are managed by the Internet and tech companies, such as Apple, Google, Amazon and Facebook and how these companies’ data collection/processing practices circumvent online users' privacy rights. The case study will predominately focus on Google’s practice of manually assessing ...
The chapter concerns public and private policing of online platforms and the current challenges i... more The chapter concerns public and private policing of online platforms and the current challenges in terms of legislation, policing practices and the Dark Web.
This thesis explores the nature of cyber-security at the beginning of the 21st century. In the cu... more This thesis explores the nature of cyber-security at the beginning of the 21st century. In the current security paradigm, security strategies based on anticipatory governance have become essential in the management of the constantly changing cyber-security environment. Thus, this thesis aims to understand security strategies and governance introduced in the European region. The increased dependency on cyber-space is visible in all public-private sectors and governmental operations, as well as communications between groups and individuals. As a result, cyber-attacks on public and private entities are increasing. This requires a security framework that is flexible and establishes different types of security cooperation to manage the widespread cyber-risks. This is essential to the development of security strategies, governance forms, practices, and guidelines for enhancing resilience and preparedness towards cyber-risks. Therefore, I am examining cyber-security through the lenses of n...
Discussion about a coordinated approach to removing online extremism that looks beyond big intern... more Discussion about a coordinated approach to removing online extremism that looks beyond big internet companies.